Sciweavers

1098 search results - page 166 / 220
» Proactive Intrusion Detection
Sort
View
ICIP
2006
IEEE
16 years 3 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
INFOCOM
2007
IEEE
15 years 8 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
DSOM
2005
Springer
15 years 7 months ago
Decentralized Computation of Threshold Crossing Alerts
Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a certain ...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
COMSWARE
2006
IEEE
15 years 5 months ago
VoIP service quality monitoring using active and passive probes
Service providers and enterprises all over the world are rapidly deploying Voice over IP (VoIP) networks because of reduced capital and operational expenditure, and easy creation o...
Shipra Agrawal, P. P. S. Narayan, Jeyashankher Ram...
HCI
2007
15 years 3 months ago
An Adaptive Vision System Toward Implicit Human Computer Interaction
In implicit human computer interaction, computers are required to understand users’ actions and intentions so as to provide proactive services. Visual processing has to detect an...
Peng Dai, Linmi Tao, Xiang Zhang, Ligeng Dong, Gua...